Lucene search

K
cvelistMitreCVELIST:CVE-2020-15849
HistorySep 30, 2020 - 6:28 p.m.

CVE-2020-15849

2020-09-3018:28:20
mitre
www.cve.org
2
blind sql injection
settingscontroller
email templates
administrative account
sensitive data
authorization bypass
password reset
database
yii framework
bizrule
remote command execution
php code
file upload vulnerability

AI Score

7.6

Confidence

High

EPSS

0.001

Percentile

43.0%

Re:Desk 2.3 has a blind authenticated SQL injection vulnerability in the SettingsController class, in the actionEmailTemplates() method. A malicious actor with access to an administrative account could abuse this vulnerability to recover sensitive data from the application’s database, allowing for authorization bypass and taking over additional accounts by means of modifying password-reset tokens stored in the database. Remote command execution is also possible by leveraging this to abuse the Yii framework’s bizRule functionality, allowing for arbitrary PHP code to be executed by the application. Remote command execution is also possible by using this together with a separate insecure file upload vulnerability (CVE-2020-15488).

AI Score

7.6

Confidence

High

EPSS

0.001

Percentile

43.0%

Related for CVELIST:CVE-2020-15849